Remove tags mobile-apps
article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

A recent scoop by Reuters revealed that mobile apps for the U.S. But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mobile devices.

Mobile 246
article thumbnail

Malware on the Google Play store leads to harmful phishing sites

Malwarebytes

A family of malicious apps from developer Mobile apps Group are listed on Google Play and infected with Android/Trojan.HiddenAds.BTGTHB. In total, four apps are listed, and together they have amassed at least one million downloads. After the initial delay, the malicious app opens phishing sites in Chrome.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

CISA has added nine flaws to its Known Exploited Vulnerabilities catalog, including bugs exploited by commercial spyware on mobile devices. The exploits were used to install commercial spyware and malicious apps on targets’ devices. Google TAG shared indicators of compromise (IoCs) for both campaigns.

Spyware 82
article thumbnail

New Android malicious library Goldoson found in 60 apps +100M downloads

Security Affairs

A new Android malware named Goldoson was distributed through 60 legitimate apps on the official Google Play store. The apps totaled more than 100 million downloads in the ONE store and Google Play stores in South Korea. It is important to highlight that the library was not developed by the authors of the apps.

article thumbnail

GUEST ESSAY: JPMorgan’s $200 million in fines stems from all-too-common compliance failures

The Last Watchdog

While the price tag of these violations was shocking, the compliance failure was not. The ever-changing landscape of rapid communication via instant messaging apps, such as WhatsApp, Signal, WeChat, Telegram, and others, has left regulated industries to find a balance between compliance and efficient client communication.

Mobile 254
article thumbnail

Security Affairs newsletter Round 371 by Pierluigi Paganini

Security Affairs

SecurityAffairs awarded as Best European Personal Cybersecurity Blog 2022 Crooks are using RIG Exploit Kit to push Dridex instead of Raccoon stealer Flagstar Bank discloses a data breach that impacted 1.5

article thumbnail

Actor’s verified Twitter profile hijacked to spam NFT giveaways

Malwarebytes

Well, times have changed on the big blue bird app. To enter: Follow me & @GrumpyKatzNFT Like & RT Tag 3 friends. This blog is safe for work so if you wish to see her, um, very enthusiastic condemnation of the account compromise, click here. That is to say, promoting a range of pixel art cats known as “GrumpyKatz”.

Scams 97